Category : InfoSecIsland

The growing need to secure the “keys to the kingdom” and the steps organizations need to take to protect their critical credentials
The constantly evolving threat landscape continues to bring organizations — even of enterpris...

The most significant costs in security operations come from an unlikely source &- missed opportunities caused by not collecting and organizing log data. In order to operate more efficiently, security operations need to collect more data to sup...

The modern public cloud landscape offers a world of possibilities. The major cloud services (Amazon Web Services [AWS], Azure and Google Cloud Platform [GCP] provide robust solutions with an ever-growing list of services and features. Today 81 per...

All threat actors will know that the day they gain access to an account with full administrative rights, they’ve hit a goldmine. It only takes one weak endpoint for an attacker to have free reign over an entire corporate network. The 2016&am...

We have seen disruptions affect every industry during the last millennia. From chemical photography to digital photography, from horse drawn carriages to supersonic flight, from shovels to hydraulic excavators, from the telegraph to the telephone...

Companies today have a huge task on their hands with the sheer volume of red tape to demonstrate compliance. Such is the global nature of today’s regulations that most organisations must adhere to them even if they are not physically in the...

A series of cyberattacks& attempting to steal financial information and login credentials from Mexican users,& that hve been ongoing for at least five years, Kaspersky Lab says.recently discovered complex malicious campaign has been
As...

Most small and medium businesses (SMBs) are not equipped to handle IT security concerns and distribute security responsibilities across other roles, a recent survey from Untangle reveals.
Although the vast majority (80%) of SMBs do consider s...

Cryptocurrency was among the biggest stories of 2017 when Bitcoin peaked at more than $19,000 per unit. While already popular among cybercriminal groups, especially when deploying ransomware, Bitcoin found new success in mass adoption among consum...

In a recent article I discussed the four secrets to building a strong, intentional and sustainable security culture. One of those secrets is focused on viewing security awareness through the lens of organizational culture. As I described in that p...

An Amnesty International staff member was recently targeted with spyware linked to the infrastructure previously associated with Israel surveillance vendor NSO Group.
The attack arrived via WhatsApp, in the form of a message containing Saudi A...

Cloud data breaches are up nearly 45% year over year and are becoming more sophisticated. Unfortunately, IT is struggling to keep up as the nuances of clouds are different. We have reached an inflection point where business as usual &- throwin...

One of the most cited statistics related to cyberattacks is the average cost of a data breach as calculated by The Ponemon Institute with support from IBM. The& 2018 Cost of a Data Breach& report, which has become an industry benchmark, al...

During the second quarter of 2018, the United States has become the top region by number of distributed denial of service (DDoS) botnet command and control (C&C) servers, accounting for nearly half of them, Kaspersky Lab reports.
Of all k...